Homepage SharITSec

Featured Post

Stressing LLMs - Triage Stage

Packers, cryptors, and code obfuscation are all methods used to bypass signature-based scanners in AV/EDR or to slow down the r...

Sp123 2 May, 2026

Latest Posts

Stressing LLMs - Triage Stage

Packers, cryptors, and code obfuscation are all methods used to bypass signature-based scanners in AV/EDR or to slow down the r...

Sp123 2 May, 2026

Tuned by Design: Why Detection Engineering Needs Its Own Development Lifecycle

We embraced “Secure by Design” in software development. It is time we applied the same philosophy to SOC detection content — in...

Sp123 2 May, 2026

Maryland pharmacist indicted on unauthorized computer access related to U. Maryland Medical Center

From the U.S. Attorney’s Office, District of Maryland: A Maryland man is facing federal indictment stemming from an unauthorize...

Sp123 2 May, 2026

Russian Hacker Known as “Digit” Pleads Guilty to Cyberattacks on Ukraine and the US

Anna Tkach reports: Russian hacker Artem Revensky has admitted to orchestrating cyberattacks targeting critical infrastructure ...

Sp123 2 May, 2026

Kentwood, Michigan, schools say student malware disrupted Wi-Fi

DysruptionHub reports: Kentwood Public Schools said districtwide Wi-Fi was disrupted after a student used malicious software de...

Sp123 1 May, 2026

The Life-Dinner Principle in Detection

“The rabbit runs faster than the fox, because the rabbit is running for his life while the fox is only running for his dinner.”...

Sp123 1 May, 2026

Vulnerability in LEX Baza Dokumentów software

Cross-site Scripting vulnerability (CVE-2026-1493) has been found in LEX Baza Dokumentów software. Introduction to Malware Binary Triage (...

Sp123 30 Apr, 2026

The New Partner-Vendor Relationship

Part 4 of 6: Aligning co-marketing for conversion Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Ge...

Sp123 30 Apr, 2026